Keyword: bkdr_back.b
34089 Total Search   |   Showing Results : 541 - 560
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This crypto-ransomware speaks apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan
dating back to 2008. PlugX allows remote users to perform malicious and data theft routines on a system without the user’s permission or authorization. These malicious routines include: Copying, creating,
Noteworthy: FAREIT is back: PDF exploit and Powershell tandem used to expand infection This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It
This crypto-ransomware speaks apart from dropping ransom notes. It determines the location (country) of the computer it infects, and avoids infecting computers found in certain countries. This Trojan
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It modifies the Internet Explorer Zone Settings. It
This adware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This adware arrives on a system as a
This Trojan may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This joke program may be hosted on a website and run when a user accesses the said website. Arrival Details This joke program may be hosted on a website and run when a user accesses the said website.
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
directories (download, execute, create, change permissions) List running processes Perform UDP DDOS Execute SQL commands Perl and PHP back connect Generate hashes Remove shell Deface the site and report to
Database Manager Execute Processes Invoke Shell Start Back Connect Perform Port Scan Download user-input files Manipulate Clipboard Remote Control View JSP Environment Information Port Map Java Reflect
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
compromised. It is used for reporting to its C&C server. The 'netinit.exe' is responsible for the following: Sending information about the infection back to the server. It is capable of receiving files from the
sending information about the infection back to the server: http://{BLOCKED}ver/category/page.php?shinu={encrypted data} {encrypted data} is the number of files that is overwriten by the malware. This is
This Trojan modifies the Internet Explorer Zone Settings. It connects to certain websites to send and receive information. Installation This Trojan drops the following component file(s): %Desktop%
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It connects to certain websites to send and receive
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a